Oral History of Gary Hendrix

Total Page:16

File Type:pdf, Size:1020Kb

Oral History of Gary Hendrix Oral History of Gary Hendrix Interviewed by: Dag Spicer Recorded: November 19, 2004 Mountain View, California CHM Reference number: X3008.2005 © 2004 Computer History Museum Table of Contents NATURAL LANGUAGE UNDERSTANDING .........................................................................................................3 MACHINE TRANSLATION OF LANGUAGE..........................................................................................................7 ARTIFICIAL INTELLIGENCE....................................................................................................................................9 NATURAL LANGUAGE PROCESSING................................................................................................................11 SEMANTIC GRAMMARS........................................................................................................................................12 GENERALIZING SEMANTIC GRAMMARS .........................................................................................................14 ADVANCES IN ARTIFICIAL INTELLIGENCE......................................................................................................16 MICROCOMPUTERS ..............................................................................................................................................17 STARTING AN AI-BASED BUSINESS .................................................................................................................18 THE FIRST PROJECT.............................................................................................................................................19 MACHINE INTELLIGENCE CORPORATION ......................................................................................................21 STARTING SYMANTEC..........................................................................................................................................23 FINANCING THE COMPANY.................................................................................................................................25 DELIVERING A PRODUCT ....................................................................................................................................27 REORGANIZING SYMANTEC ...............................................................................................................................27 RESTARTING SYMANTEC ....................................................................................................................................29 REINVENTING SYMANTEC...................................................................................................................................31 OTHER SYMANTEC PRODUCTS ........................................................................................................................34 ACQUISITIONS ........................................................................................................................................................35 GOING PUBLIC ........................................................................................................................................................36 Gary Hendrix Conducted by Software History Center—Oral History Project Abstract: Gary Hendricks discusses in some detail his interest in natural language analysis and machine translations. He covers a number of his Artificial Intelligence related projects at SRI International. He describes how he and 15 other SRI employees formed the Machine Intelligence Corporation and the reasons why it didn’t succeed. He then goes into starting Symantec, how it was financed and the problems of having too many Ph.D.’s and the difficulties of trying to bring a more production-oriented approach to its offerings. He discusses Symantec’s initial products, its organization and its transformation into a publicly-held systems utilities company. This oral history ends with Gary Hendrix leaving Symantec in 1991. Dag Spicer: It’s Friday, November 19, 2004. I’m Dag Spicer and I’m here with Gary Hendrix at Mountain View, California at the Computer History Museum. Gary was the founder of Symantec in 1982. I just want to talk about two tracks with you. One is your professional disciplinary track which is computational linguistics and how you got interested in computing and the problems of language and language recognition, and then your experience with Symantec which you founded in 1982 and any lessons you might have learned from there. We’ll talk about numerous things. Does that sound all right? Gary Hendrix: It sounds like fun. Natural Language Understanding Spicer: Great. I’ll just throw out a date, 1970. ARPA came out with a series of funding for six different projects in natural language understanding, I believe. And this is about the time I think that you got into the field. Is that right? Hendrix: Well, that’s about right. I was an undergraduate at the University of Texas and I finished that up in 1970 in May and then I quickly got a Masters in computer science. That ended in December of 1970. And I was beginning to get into artificial intelligence just a little bit and sort of overlapping with operations research, but then beginning in January of 1971, I was CHM Ref: X3008.2005 © 2006 Computer History Museum Page 3 of 37 fulltime thinking about artificial intelligence and my supervising professor was Robert Simmons who was into computational linguistics and he was the man on the UT campus who was wired into that world. I also took a number of courses in other AI-related areas like robot planning, Laurent Siklossy, if I get his name right (he was always on my case about not saying it right), was another influence because he got me interested in robotics and, to some extent, the representation of semantic knowledge which I then used with Simmons and that’s where the name Symantec eventually came from. I did some work in the area of robotics and planning and I wrote a paper that I submitted for publication in one of the journals. And the people at SRI International read this paper and invited me out one summer. And there was a conference at Stanford. I guess it was one of the first joint conferences on artificial intelligence. And so because they had read this paper, they were interested in me and I eventually got hired by them even before I finished my Ph.D. Spicer: For people who don’t know what natural language understanding is, can you just tell us a little bit about what it is? It’s not speech recognition, is it? Hendrix: No, no. It’s trying to get computers to understand naturally-occurring languages like English or French or German as opposed to artificial languages like COBOL or C or FORTRAN or SQL, something like that. And there was a time when computers didn’t have graphical user interfaces and you had to communicate with them through some kind of language. You could argue that a graphical user interface is a kind of language too, but I’m talking about a more traditional language in which there are sentences of one kind or another. And we had thought that perhaps the use of English would open up computers for a wide range of uses and also, just as a science, it was and still is a fascinating field because we really don’t understand much about how the human mind works. We don’t really understand very much about how people process language and how they extract the meaning from it, how they think about things other than numerical kinds of things. And how you represent these in computers even thirty years later is still a pretty big mystery. Spicer: I’m very interested in the disciplinary underpinnings for that, which let’s just call it a disciplinary push versus say a contract pull which we’ll get to later. The U.S. Army had a great interest in voice-activated systems and so on for which your technology and interest would naturally meld. But in the theoretical foundations of computational linguistics, does that develop around Noam Chomsky and the early attempts in the late 1950s with artificial intelligence and the belief that we know a little bit about linguistics, enough to know that maybe we can extend it with a computer and produce really interesting research results, if not practical products? Hendrix: Well, certainly Chomsky was the big intellectual contributor to the field and he’s an absolute giant. There’s no one like Chomsky. And he developed many theories involving language. A lot of them were fairly mathematical in nature, describing how you could represent various kinds of grammar, how different levels of grammar behave mathematically. And people picked up on this and tried doing things with it. In one sense, the compilers are based on some CHM Ref: X3008.2005 © 2006 Computer History Museum Page 4 of 37 of Chomsky’s work in that the way you look at languages that you could use to design languages for machines. And what the people trying to understand natural languages were doing, well, they were saying, “Well, okay, we’re going to try to write a parser or we’re going to try to understand the grammar of English.” Computer languages are designed in such a way that once the syntax is understood, the meaning of what’s being expressed is also readily understood because the whole thing is artificial. It’s built up out of little pieces in the way computers are built up so the fundamental parts are all very well understood. I mean, if you get down to the bottom level, it’s ones and zeros, offs and ons. And then the components that are built up out of that are well understood
Recommended publications
  • GBCC-CIS-1 Page 1 Micro-Soft’S Macro-Impact
    CIS111 GBCC Renee Dodge CIS111 Mid-Term – Fall 2010 For your mid-term, I would like you to conduct some research on the history of computers. Select a milestone or event that you feel had a significant impact on the overall development of computers and how we use computers today. Be sure you not only provide your opinion as to why you feel this milestone is significant, but also provide historical proof - actual facts as to how this event shaped the development and use of computers. For this assignment, please complete the following: 1. Choose a topic 2. Research your topic and locate at least 5 different sources of information, overall. o At least 3 sources should be Internet websites. o Remember: Wikipedia is NOT an acceptable research source. 3. In addition to the Internet, you should also utilize the library online resources (EBSCO database, e-Books, etc). o At least 2 different sources of information should be online library resources. o If you have never used the library online resources before, you may ask me for a brief overview of how to use them or see Becky Clerkin in the library for help. 4. Include your research findings in a 5-page paper and be sure to properly cite where you found your information. If you are not sure how to cite references check out the following link: How to Cite Books, Magazines, and Web Sites in a Research Paper: http://www.lib.duke.edu/libguide/works_cited.htm 5. Upload your research paper to the Digital Drop BoX no later than Wednesday, October 27th at 11:59pm.
    [Show full text]
  • Top 100 Global Innovators 2021 10-Year Anniversary
    Top 100 Global Innovators 2021 10-year anniversary edition Celebrating 10 years of Top 100 Global Innovators Contents 06 Foreword 09 A habit for the new 10 Creating the list 12 Top 100 Global Innovators 2021 18 One year on 24 The hidden value of innovation culture 26 An ideation keel 3 Break– out 4 29 that have led the way. These 29 companies have appeared in the Top 100 Global Innovators list every single year since its inception a decade ago. With an average age of a century, the foundational stories of these firms and the themes they teach, endure and resonate today. Company history information was sourced from publicly available web records, including company websites, and best efforts were made to share with organizations for veracity. Break– 1665 — Saint-Gobain In October 1665, King Louis 14th of France granted a charter to minister Jean-Baptiste Colbert for a new glass and mirror making company, the Royal Mirror Glass Factory. With glassmaking expertise in the 17th century monopolized by Venice, the new company brought valuable Venetian glass makers, and their rare knowledge, across the Alps. After 365 years of prosperity and expansion with orders from the royal household (including the Hall of Mirrors at Versailles), today Saint-Gobain is a out global supplier and innovator of high- performance and sustainable materials (including glass) across a broad range of industries including construction, mobility, health and manufacturing. 1875 — Toshiba In 1875 Hisashige Tanaka opened Tanaka Engineering Works in Tokyo, manufacturing telegraphic equipment. Five years later, Ichisuke Fujioka established Hakunetsu-sha & Company, with a focus on developing the first Japanese-designed electric lamps.
    [Show full text]
  • Ppalmtop Aper
    FALL 991 ,....----THE PPalmtop aper INSIDE: Publisher's Message. • . .. 1 LeHers ............••..•... 2 Most Frequently Asked HP 95LX News from HP Questions to HP Technical Support NewsStream Receiver ......... 4 DictionaryfThesaurus . .. ....... 7 We thank the HP technical support stafffor their Other products .. .. 9 considerable efforts in compiling for The HP Palmtop Paper readers these answers to the most often asked HP HP 95LX Support ............ 9 95LX questions. In this first of a two-part series, HP's CompuServe ............... 10 900-number support staff answers querie.1l concerning Most Asked Questions ........ 13 file transfer, programming, printing, phone directory HP Support ................ 16 conversion, internal RAM and RAM cards, AC adapter, DOS Connection batteries, and installing the HP 95LX Connectivity Pack. File Compression ... .... ... 17 DOS Software .............. 20 By the Hewlett-Packard HP 95LX Support Staff Quick Tips ..•..•.....•.. 22·23 Columns Batteries Looking Glass .............. 25 Sawy User . ............... 27 How can I make my batteries last longer? Programmer's Corner ......... 30 First, use the AC adapter whenever possible. Applications Getting Started . .. 33 which continuously update the screen (i.e. TigerFox), or use the serial port (i.e. FILER or COMM) use more power than programs Thaddeus Computing News ... 35 which spend most of the time waiting for keystrokes. Use of the HP Palmtop Paper: the future ... 35 AC adapter is especially important with these high power usage How to contribute .... .. 35 programs. HP Palmtop Paper on disk ..... 35 Free Subscriber's disk. .. 36 Second, always close the FILER and COMM applications Challenge to readers . .. 36 when they are not in use. These two applications turn on the power to the 95LX's serial port.
    [Show full text]
  • Learning to Code
    PART ILEARNING TO CODE How Important is Programming? “To understand computers is to know about programming. The world is divided… into people who have written a program and people who have not.” Ted Nelson, Computer Lib/Dream Machines (1974) How important is it for you to learn to program a computer? Since the introduction of the first digital electronic computers in the 1940s, people have answered this question in surprisingly different ways. During the first wave of commercial computing—in the 1950s and 1960s, when 1large and expensive mainframe computers filled entire rooms—the standard advice was that only a limited number of specialists would be needed to program com- puters using simple input devices like switches, punched cards, and paper tape. Even during the so-called “golden age” of corporate computing in America—the mid- to late 1960s—it was still unclear how many programming technicians would be needed to support the rapid computerization of the nation’s business, military, and commercial operations. For a while, some experts thought that well-designed computer systems might eventually program themselves, requiring only a handful of attentive managers to keep an eye on the machines. By the late 1970s and early 1980s, however, the rapid emergence of personal computers (PCs), and continuing shortages of computer professionals, shifted popular thinking on the issue. When consumers began to adopt low-priced PCs like the Apple II (1977), the IBM PC (1981), and the Commodore 64 (1982) by the millions, it seemed obvious that ground-breaking changes were afoot. The “PC Revolution” opened up new frontiers, employed tens of thousands of people, and (according to some enthusiasts) demanded new approaches to computer literacy.
    [Show full text]
  • Third BUSINES Superbrands-2010-Final 6/1/11 12:46 PM Page 92
    Third BUSINES Superbrands-2010-final 6/1/11 12:46 PM Page 92 Market safeguard and keep open cyber highways is a imminently powerful, year after year. Cyberspace is full of creepy crawlies. Consider source of abiding comfort for millions of In 2007, for instance, International Data the latest gremlins – Pillenz, Bamital, Sefrnit, internet users. Corporation (IDC) recognised Symantec in a Pylespa, Daonol, Zbot and Tidserv and add the Its success can be attributed to keeping its wide range of award categories including Data old, broad-spectrum favourites, spyware, adware, ears to the ground and developing technologies Protection and Recovery; Cross-platform worms, viruses, trojans and spam and you’ve that synchronise with the needs of customers. provider of Clustering and Availability; Email entered the world of cyber crime.These are the To accomplish this feat the company has created Archiving Applications; Security and Vulnerability pests which have made working on a PC or a unique web called the Symantec Global Management; and Policy and Compliance, and laptop a forgettable nightmare.The universal Intelligence Network.This is an extraordinary Host and Vulnerability Software; plus an award quest for a protector has thrown up several resource which provides a real-time view of for software developed for Messaging Security names but the one that has become virtually emerging digital threats almost anywhere in the and Virus Protection. synonymous with computer software, world. With more than 40,000 sensors in 180 In the same year, Gartner rated the company particularly in the realms of security and countries and more than 6200 managed security as Global Market Share Leader in Enterprise information management, is Symantec.
    [Show full text]
  • Table of Contents
    ^9/08/89 11:43 U206 883 8101 MICROSOFT CORP.. 12)002 Table of Contents m-^mm Table of Contaits 09/08/89 11:44 'Q206 883 8101 MICROSOFT CORP _ _ [ 1003 The Story Begins JAN The story of MS-DOS_begins ..in a hotel in Albuquerque, New Mexico. 1975 In 1975, Albuquerque was the home of Micro Instrumentation'Telemetry MiTS introduces the 8080-baseci Systems, better known as MITS- In January of that year, MITS had intro- Altair computer. duced a kit computer called the Altair. When it was first snipped, the Altair consisted of a metal box with, a panel of switches for input and output, a power supply, and-two boards. One board was the CPU.. At its heart was the 8-bit 8080 microprocessor chip from InteL The other board provided 256 bytes of memory. The Altair had no keyboard, no monitor, and no permanent storage. But it had a revolutionary price tag. It cost $397. For the first time, the term "personal computer" acquired a real-world meaning. The real world of the Altair was not, however, the world of business computing. It was-primarily the world of the computer hobbyist These first users of the microcomputer were not as interested in using spreadsheets and word processors as they were in programming. Accordingly, the first soft- ware for the Altair was a programming language. And the company that developed it was a two-man firm, in Albuquerque, called Microsoft FEB The two men at MiCTosof^ej^PailjAJten^and Bffl Gates-Allen and 1975 Gates-had met when-they were both students at Lakeside High School in Microsoft sails first BASIC to Seattle, where they began their computer-science education oa the school's MITS lor Altair time-sharing terminal By the time Gates had graduated, me two of them had computer.
    [Show full text]
  • Windows in Concurrent PC
    Using Concurrent PC DOS OTHER BOOKS BY THE AUTHOR Microcomputer Operating Systems (1982) The Byte Guide to CP/M-86 (1984) Using Concurrent PC DOS Mark Dahmke McGraw-Hili Book Company New York St. Louis San Francisco Auckland Bogota Hamburg Johannesburg London Madrid Mexico Montreal New Delhi Panama Paris Sao Paulo Singapore Sydney Tokyo Toronto Library of Congress Cataloging-in-Publication Data Dahmke, Mark. U sing Concurrent PC DOS. Bibliography: p. Includes index. 1. Concurrent PC DOS (Computer operation system) 1. Title. QA76.76.063D34 1986 005.4' 469 85-15473 ISBN 0-07-015073-7 Copyright © 1986 by McGraw-Hili, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher. 1234567890 DOC/DOC 893210876 ISBN 0-07-015073-7 The editors for this book were Steven Guty and Vivian Koenig, the designer was Naomi Auerbach, and the production supervisor was Teresa F. Leaden. It was set in Century Schoolbook by Byrd Data Imaging. Printed and bound by R. R. Donnelley & Sons Company. To my sister Patricia Contents Chapter 1. Introduction 1 What Is Concurrent PC DOS? 1 What Is an Operating System? 1 The DOS Family Tree 3 The Scope of This Book 5 Chapter 2. Concurrent PC DOS Compatibility 6 Concurrent PC DOS Compatibility 6 PC·DOS, TopView, and the IBM PC AT 7 Concurrent CP/M·86 9 Chapter 3.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]
  • Personal Computing
    Personal Computing Thomas J. Bergin ©Computer History Museum American University Recap: Context • By 1977, there was a fairly robust but fragmented hobbyist-oriented microcomputer industry: – Micro Instrumentation Telemetry Systems (MITS) – Processor Technology – Cromemco – MicroStuf – Kentucky Fried Computers • Two things were needed for the personal computer revolution: 1) a way to store and retrieve data, and 2) a programming language in which to write applications. Homebrew Computer Club • March 5, 1975: the Amateur Computer Users Group (Lee Felsenstein, Bob Marsh, Steve Dompier, BobAlbrecht and 27 others) met in Gordon French’s garage, Menlo Park, CA • 3rd meeting drew several hundred people and was moved to the Coleman mansion • Stanford Linear Accelerator Center’s auditorium – Steve Wozniak shows off his single board computer – Steve Jobs attends meetings Homebrew-ed • 21 companies formed: – Apcose Apple – Cromemco Morrow – North Star Osborne • West Coast Computer Faire • Byte magazine, September 1975 • Byte Shop Both: images.google.com And then there was Traf-O-Data • October 28, 1955: William H. Gates III born – father: attorney mother: schoolteacher • Lakeside School: Lakeside Programming Group – Mothers Club: access to time-shared system at GE – Students hired by local firm to debug software – First computer program: Tic-Tac-Toe (age 13) – Traf-O-Data to sell traffic mgt. software (age 16) • 1973, Bill Gates enrolls at Harvard in pre-law. • Paul Allen is in his second year. January 1975, Popular Electronics: Altair • Allen shows
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • “Not Only Microsoft: the Maturing of the Personal Computer Software
    Martin Campbell-Kelly Not Only Microsoft: The Maturing of the Personal Computer Software Industry, 1982-1995 In the thirteen years following the introduction of IBM's first personal computer in 1982, Microsoft rose from being a small concern to become the colossus of the PC software industry. However, Microsoft was not the only software company to profit from the PC-software boom: firms like AutoDesk, Lotus Development, WordPerfect Corp., Ashton-Tate, Novell, Borland, Adobe Systems, Aldus, Symantec, and the Santa Cruz Operation all had their time in the sun. Whereas some of these firms lost their markets to Microsoft or stumbled through strategic errors, others remained hugely successful, and their relative obscurity is largely due to the contemporary obsession with Microsoft and its billionaire founder. he early history of the personal computer is well known. It has fea- Ttured in the press, in numerous popular histories of computing, and in television programs such as Robert X. Cringley's "Triumph of the Nerds."1 Within the business history community, the story is known at a deeper level, partly through the inevitable osmosis that ac- companies the daily use of a personal computer, but also through arti- cles such as Richard Langlois's study of the microcomputer industry, MARTIN CAMPBELL-KELLY is a reader in computer science at the University of War- wick, England. My work on the history of the software industry has been supported by the Economic and Social Research Council (award number R000237065). I would like to thank my research as- sociates at Warwick University, Dr. Mary G. Croarken and Dr.
    [Show full text]
  • Commemorative Booklet for the Thirty-Fifth Asilomar Microcomputer Workshop April 15-17, 2009 Programs from the 1975-2009 Worksho
    35 Commemorative Booklet for the Thirty-Fifth Asilomar Microcomputer Workshop April 15-17, 2009 Programs from the 1975-2009 Workshops This file available at www.amw.org AMW: 3dh Workshop Prologue - Ted Laliotis The Asilomar Microcomputer Workshop (AMW) has played a very important role during its 30 years ofexistence. Perhaps, that is why it continues to be well attended. The workshop was founded in 1975 as an IEEE technical workshop sponsored by the Western Area Committee ofthe IEEE Computer Society. The intentional lack of written proceedings and the exclusion of general press representatives was perhaps the most distinctive characteristic of AMW that made it so special and successful. This encouraged the scientists and engineers who were at the cutting edge ofthe technology, the movers and shakers that shaped Silicon Valley, the designers of the next generation microprocessors, to discuss and debate freely the various issues facing microprocessors. In fact, many features, or lack of, were born during the discussions and debates at AMW. We often referred to AMW and its attendees as the bowels of Silicon Valley, even though attendees came from all over the country, and the world. Another characteristic that made AMW special was the "required" participation and contribution by all attendees. Every applicant to attend AMW had to convince the committee that he had something to contribute by speaking during one of the sessions or during the open mike session. In the event that someone slipped through and was there only to listen, that person was not invited back the following year. The decades ofthe 70's and 80's were probably the defining decades for the amazing explosion of microcomputers.
    [Show full text]